350 likes | 373 Views
Learn how Missouri Cancer Registry maintains patient confidentiality & data security in evolving IT era. Includes measures, policies, & procedures to ensure compliance.
E N D
Improving data security and maintaining patient confidentiality in a time of evolving information technology (IT) and limited resources
J. Jackson-Thompson, MSPH, PhDOperations Director, Missouri Cancer Registry and Research Associate Professor, Health Management & Informatics, University of Missouri- Columbia jacksonthompsonj@health.missouri.edu573 882-7775 http://mcr.umh.edu
Acknowledgments • Co-author: Nancy Cole, BS, CTR, MCR Operations Manager (colen@health.missouri.edu) • MCR Staff • Saba Yemane, BA, BS, Database Manager • Iris Zachary, CTR, MS (Informatics), Asst DBM • Alena Headd, MSIT Systems Analyst • University of Missouri IT Security Team
This project was supported in part by a cooperative agreement between the Centers for Disease Control and Prevention (CDC) and the Missouri Department of Health and Senior Services (DHSS) (U58/DP000820-02/3) and a Surveillance contract between DHSS and the University of Missouri. No personal financial relationships with commercial interests relevant to this presentation existed during the past 12 months.
Background • All U.S. states and Canadian provinces maintain a central cancer registry (CCR) that collects information on all (≥ 95%) new cases of cancer. • All CCRs collect demographic, tumor & treatment data on each case, using • text and standard codes • standard data layout.
Background: Uses of CCR Data • Public health surveillance • Cancer incidence/trends by race, gender, age group, specific site, stage at diagnosis, etc.; • Program evaluation; • Research • QOL, patterns of care studies, etc.
CCRs are required to: • Meet national standards for completeness, timeliness & quality • e.g., NAACCR, CDC/NPCR, NCI/SEER • Protect patient and provider confidentiality • Specific state & federal statutes/laws/regs • Maintain data security • Some guidelines
MCR Data • Process > 50-60,000+ records/year • c. 29,000 MO incident cases • Data exchange w/ 20 states • Database >1 million records (1972-2009) • Population-based since 1985 • NPCR reference year 1996
MCR Software • Registry Plus suite of products • Started w/ Abstract Plus, then Web Plus & Link Plus • Switched to CRS Plus in 2007 • Use other software as needed • SEERStat* and SAS for data analysis • MoveIT for importing VA data
MCR Approach to Data Security • Similar to reporting of cancer cases: • Report not because of a law but so we can work together for better patient outcomes. • Be vigilant about data security not based on statutory & contractual obligations but because it is the right thing to do: • Reporting facilities & cancer patients trust us.
MCR Concerns • Minimal IT input on MCR software, hardware or data flow since 2005; • No strong passwords on Registry Plus products: • Web +, CRS +, Abstract +, Prep + • Strong passwords not on all laptops: • Passwords taped to some laptops.
Purpose of Presentation • To describe steps taken by MCR to assess and improve the security of data, systems and processes.
Methods • Reviewed MCR’s security processes and procedures. • Identified and assessed data security measures already in place. Measures: • Designed to cover all data, electronic or paper • Included Policies and Procedures that were updated as needed
Examples of Data Policies and Procedures • No PHI on thumb drives • No PHI in e-mails or attachments • Lock file cabinets & offices • Only MCR staff have keys to MCR offices • Send charts/records to PO Box or by FedEx • Carry mail & data in locked bags
Data Security Measures • Ongoing training for staff • All MCR staff reminded annually by signing: • Confidentiality agreement; • Acknowledgment of state and federal laws about penalties; and • MCR laptop security policy. • “The Security Mouse was here”
Weather alert changed MCR’s paper-handling policies • Tornado drill – staff from another unit directed to MCR office • Led to changes: • Change in drill location • More locking cabinets • Lock doors if leave • No papers visible • Cross-cut shredder
Actions re. electronic data security • Requested that the University of Missouri’s (MU) IT security team audit our systems & business practices.
Data Security Structure • MU • IT: dept, campus and hospital • Servers housed off-site in 24/7 IT facility • Most reporting facilities use Web Plus (VA hospitals use MoveIT) • DHSS/State Office of Administration • SFTP site folder restrictions at DHSS • BCCCP data • Some path lab data (PHIN/MS)
MU Information Security Program • System initiative - all 4 campuses • MCR & IT Security Team met to review issues: • Data classification systems • General security procedures • strong passwords, encryption, etc. • Workplace security manual • Audits
Steps for each phase of security inspection program • Identification • Coordination • Inspection • Evaluation • Recommendation • Repetition
What IT Audit Includes • Hard drive security • Data flow • Applications • Desktop risks • Firewall issues with individual computers • Hardening operating system • Laptop & jump drive encryption • Virtual servers
Audit priorities established • Start with Web Plus: • Considered MCR’s most vulnerable area by Audit team • Concern about text fields – places where hackers could include hazardous characters.
First phase: Applications – Web Plus Audit • Facility abstractor/uploader and central administrator/central abstractor/reviewer. • 52 hours of testing using an automated vulnerability scanner and manual inspection of web pages. • Results: 4 high-risk vulnerabilities, several moderate risks. • Auditor comments: • “Went better than expected.” • “Web Plus is a good application.”
Web Plus Audit - continued • Results sent to CDC • High-risk vulnerabilities & some moderate risks fixed immediately • Requested 2nd scan to test fixes • Second scan results • No high-risk vulnerabilities detected • Fixes on moderate risks also worked • Remaining moderate risks fixed.
Second Phase: Hardening operating systems • Server audit issues related to: • Configuration • Proper port use, etc. • Management • Managing administrative infrastructure • Controlled access to file system & resources • Process is ongoing (virtual servers)
Next Steps • Increase security on mobile devices (Laptops, external hard drives, etc.): • Identify & purchase encryption software • Consider alternatives: • Remote access reduces need for abstracting software (and PHI) on laptops.
Future Steps • Research use of encryption software for desktop computers: • TruCrypt (an open-source software) • Other options • Determine security level of networked drive.
Other Security Concerns • Physical space: • MCR has P & Ps for off-site and commuting staff • MCR developed P & Ps for paper containing PHI, locking office, etc. • Audit of MCR’s space by MU Security requested 10/09 • Attempt to kick in door
Recommendations • Start with your institution’s P&Ps: • CCR’s may need to be more restrictive. • Use CDC/NPCR or other guidance. • Annually, require that CCR staff sign: • Confidentiality agreement; • Acknowledgments of state and federal laws about penalties; and • CCR security policy.
Recommendations continued • Look for opportunities to further employee awareness: • Items in the news, etc. • Computer stolen from unsecured work station. • Learn from other organizations’ practices and mistakes.
Conclusions • Frequent review of security processes and business practices is needed to maintain data security. • Many improvements involve minimal cost; others require funding.
Causes of Data Breaches • Private files available in public spaces. • Unused files with personal information. • Lost or stolen laptops. • Old or unused equipment without updated security protection. • Sending files/allowing file access to wrong (reporting) facility.
You think you are secure! • “…no matter how secure you are you fundamentally still are at risk.” • Howard, Schmidt, a former Bush cyber-security adviser, now president of the Information Security Forum. February 23, 2009 – fcw.com • “The only way to 100 percent protect yourself from attacks is to turn off your computers.” • Dan Chenok, chairman of the Information Security and Privacy Advisory Board, an advisory panel to NIST. February 23, 2009 – fcw.com
Resources • CDC/NPCR Data Security: http://www.cdc.gov/cancer/npcr/tools/security/ • For complete details about MU’s Information Security program: http://doit.missouri.edu/security/ • Federal Computer Week - Complimentary paper subscriptions, also available on-line. Variety of topics, including security: http://www.fcw.com
Manager - Brandon Hough Auditors - Tyler Hargis Michael Morrison Caine Henderson Sara Rohrs Audit coordinator - Becky Fowler Safety awareness - Kristy White Account management: Megan Hartz Joanne Boomer MU IT security teamhttp://doit.missouri.edu/security/